RFID Mutual Authentication Protocol Based on Chaos Key

Article Preview

Abstract:

While radio frequency identification (RFID) is evolving as a major technology enabler for identifying and tracking goods and assets around the world, its security issues are also increasingly exposed. A Hash-based RFID mutual authentication protocol was put forward. The key was joined into the hash algorithm, and chaos sequences were used to update the key. The protocol enhances the security of the RFID system with low cost. Experiments show that the chaos system has the character of initial value sensitivity, which can be used to distribute and update the secret key. Safety analysis show that the mutual authentication protocol can solve security issues including eavesdropping, illegal access, masquerade, spoofing attack, position tracking.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 846-847)

Pages:

1519-1523

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Karthikeyan S, Nesterenko M. RFID security without extensive cryptography[C]. Proceedings of the 3rd ACM workshop on Security of AdHoc and Sensor Networks, SASN'05, 2005: 63-67.

DOI: 10.1145/1102219.1102229

Google Scholar

[2] ZHANG Nan and ZHANG Jianhua. Research and Analyses on Open RFID Mutual Authentication Protocol [J]. Journal of computer applications, 2013. 33(1): 131-134.

DOI: 10.3724/sp.j.1087.2013.00131

Google Scholar

[3] Ding Zhi-guo, Guo Li and Wang Yu-jie. An authentication protocol based on key array for RFID [J]. Journal of electronics & information technology, 2009, 31(3): 722-726.

Google Scholar

[4] Ding Zhenhua, Li Jintao and Feng Bo. Research on Hash-based RFID security authentication protocol[J]. Journal of computer research and development. 2009, 46(4): 4 2-44.

Google Scholar

[5] Sarma S, Weis S, Engels D. RFID systems and security and privacy implications[C]. Proc. of CHES'02, 2002: 454-469.

Google Scholar

[6] Weis S, Sarma S, Rivest R. Security and privacy aspects of low-cost radio frequency identification systems[C]. Proc. of Security in pervasive Computing'04, 2004: 201-212.

DOI: 10.1007/978-3-540-39881-3_18

Google Scholar

[7] Ohkubo M, Suzuki K, Kinoshita S. Cryptographic approach to privacy-friendly tags[C]. Proc. of RFID Privacy Workshop, USA MIT, (2003).

Google Scholar

[8] Wang Hong-xia, He Chen and Ding Ke. Robust public watermarking based on chaotic map [J]. Journal of software. 2004. 15(8): 1245-1250.

Google Scholar

[9] Zhang Nan, Zhqng Jia-hua, Chen Jian-ying, and etc. Key pre-distribution scheme based on chaos in wireless sensor network. Computer application[J], 2007. 27(8): 1901-(1903).

Google Scholar

[10] Heinx O P. Chaos and Fractals[M]. New York: Springer Verlag, (1992).

Google Scholar